Security performance analysis of a chaotic stream cipher

被引:0
|
作者
Zhuosheng Lin
Guangyi Wang
Xiaoyuan Wang
Simin Yu
Jinhu Lü
机构
[1] Hangzhou Dianzi University,School of Electronics and Information
[2] Guangdong University of Technology,College of Automation
[3] Chinese Academy of Sciences,Institute of Systems Science, Academy of Mathematics and Systems Sciences
来源
Nonlinear Dynamics | 2018年 / 94卷
关键词
Chosen-ciphertext attack; Chaotic stream cipher; Security performance analysis; Attack complexity;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, the security performance analysis for a self-synchronization and closed-loop feedback-based chaotic stream cipher is given. According to the chosen-ciphertext attack method, it is found that under the condition of selecting the ciphertext as fixed value, the original chaotic iterative equation is degenerated into an asymptotically stable iterative one, so that the explicit function of state variables and key parameters can be obtained. Based on this idea, and according to the chosen-ciphertext attack method, a single key decipher algorithm is further investigated. Firstly, multiple pairs of plaintext–ciphertext are obtained by choosing the corresponding multiple frames of ciphertext as fixed values. Secondly, a set of possible estimated values for this single key is acquired by utilizing among one pair of plaintext–ciphertext. Finally, the only estimated value that satisfies all the conditions of multiple pairs of plaintext–ciphertext is determined, as an estimated value from the set of all possible estimated values. Security performance analysis results have shown that, under the condition that only one unknown key needs to be deciphered while the remaining keys are all known, the proposed algorithm can, respectively, decipher each individual key accurately. In addition, the attack complexity of the proposed method is lower than that of the exhaustive attack.
引用
收藏
页码:1003 / 1017
页数:14
相关论文
共 50 条
  • [1] Security performance analysis of a chaotic stream cipher
    Lin, Zhuosheng
    Wang, Guangyi
    Wang, Xiaoyuan
    Yu, Simin
    Lu, Jinhu
    [J]. NONLINEAR DYNAMICS, 2018, 94 (02) : 1003 - 1017
  • [2] Security analysis of a new stream cipher
    Zhang Bin
    Feng Dengguo
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (03): : 286 - 301
  • [3] Security analysis of a new stream cipher
    ZHANG Bin & FENG Dengguo State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2006, (03) : 286 - 301
  • [4] Security analysis of a new stream cipher
    Bin Zhang
    Dengguo Feng
    [J]. Science in China Series F, 2006, 49 : 286 - 301
  • [5] THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER
    Chain, Kai
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (02): : 91 - 102
  • [6] A chaotic cipher Mmohocc and its security analysis
    Zhang, Xiaowen
    Shu, Li
    Tang, Ke
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [7] Cryptanalysis of chaotic stream cipher
    Skrobek, Adrian
    [J]. PHYSICS LETTERS A, 2007, 363 (1-2) : 84 - 90
  • [8] Security Analysis of A Stream Cipher with Proven Properties
    GAO Juntao
    LI Xuelian
    [J]. Chinese Journal of Electronics, 2021, 30 (02) : 210 - 218
  • [9] Security Analysis of a New FPE Stream Cipher
    Perez-Resa, A.
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Celma, S.
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [10] Security Analysis of A Stream Cipher with Proven Properties
    Juntao, Gao
    Xuelian, Li
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 210 - 218